company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

The well-known SolarWinds campaign, hackers who compromised Mimecast networks, h...

loading..

China Chopper, a web shell exploited by the state-sponsored Hafnium cybercrimin...

loading..

The threat actors make use of text messaging management services that are meant ...

Loading...

Mimecast

Solarwinds

Mimecast's source codes stolen by Solarwinds Hackers

The well-known SolarWinds campaign, hackers who compromised Mimecast networks, have also swiped some of Mimecast’s source code repositories ...

  18-Mar-2021
  2 min read
Loading...

ChinaChopper

China Chopper: a web shell exploited by Hafnium cybercriminals

China Chopper, a web shell exploited by the state-sponsored Hafnium cybercriminals that originates from China

  17-Mar-2021
  3 min read
Loading...

Databreach

Alert: SMSes reach hackers render OTPs unsafe

The threat actors make use of text messaging management services that are meant for business, to launch their attack that redirect SMS to reach the victim’s phone number to the systems that are controlled by them...

  17-Mar-2021
  3 min read
Loading...

Botnet

Malware

Mirai

The emergence of New Mirai Variant and ZHtrap Botnet Malware

A new wave of ongoing cyberattacks that are abusing various vulnerabilities to deploy Mirai variants on compromised systems has been uncovered on Monday by cybersecurity researchers....

  17-Mar-2021
  3 min read
Loading...

Dataleak

Credit card data Hide by hackers in JPG file from compromised stores

A data leak from stolen payment cards from compromised online stores is a new trick adopted by threat actors these days

  16-Mar-2021
  2 min read
Loading...

Microsoft

32 Indian firms hit by hackers through Microsoft email servers

32 Indian organizations have been attacked by threat actors who abused flaws in unpatched Microsoft business email servers

  16-Mar-2021
  2 min read
Loading...

Dataprivacy

New side-channel attack discovered works with Javascript disabled

A new side-channel has been discovered by researchers that can be reliably abused to disclose details from web browsers that could leveraged to track users even when Javascript is fully disabled....

  16-Mar-2021
  3 min read
Loading...

Databreach

Indian Government sites hacked by Researchers exposed git and env files

The researchers from the Sakura Samurai hacking group breached Indian government websites exposed .git directories and .env files on some of these cyber systems....

  15-Mar-2021
  4 min read
Loading...

Cryptocurrency

Twitter

Hackers distribute Fake cryptocurrency giveaway scams via Twitter ads

‘Promoted’ tweets commonly known as Twitter ads are now used by hackers to distribute cryptocurrency giveaway scams

  15-Mar-2021
  3 min read
Loading...

Zeroday

Google

Another Actively exploited Google Chrome zero-day bug detected

Google has released second fix in a month as the company has addressed another actively abused zero-day in Chrome browser

  14-Mar-2021
  2 min read